Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Transparency in persuasive technology, immersive technology, and online marketing: Facilitating users' informed decision making and practical implications
In the current age of emerging technologies and big data, transparency has become an
important issue for technology users and online consumers. However, there is a lack of …
important issue for technology users and online consumers. However, there is a lack of …
Leaky forms: A study of email and password exfiltration before form submission
Web users enter their email addresses into online forms for a variety of reasons, including
signing in or signing up for a service or subscribing to a newsletter. While enabling such …
signing in or signing up for a service or subscribing to a newsletter. While enabling such …
Personal data filtering: a systematic literature review comparing the effectiveness of XSS attacks in web applications vs cookie stealing
G Rodríguez-Galán, J Torres - Annals of Telecommunications, 2024 - Springer
Cross-site scripting (XSS) attacks pose a significant threat to the security of web
applications, as they compromise personal information by stealing cookies. This study …
applications, as they compromise personal information by stealing cookies. This study …
A fait accompli? an empirical study into the absence of consent to {Third-Party} tracking in android apps
Third-party tracking allows companies to collect users' behavioural data and track their
activity across digital devices. This can put deep insights into users' private lives into the …
activity across digital devices. This can put deep insights into users' private lives into the …
Defending novice user privacy: An evaluation of default web browser configurations
Cyber novices often enter sensitive data into web browsers for routine activities such as
online shop** and bill payments, making them targets for malicious entities, including …
online shop** and bill payments, making them targets for malicious entities, including …
The {OK} is not enough: A large scale study of consent dialogs in smartphone applications
Mobile applications leaking personal information is a well established observation pre and
post GDPR. The legal requirements for personal data collection in the context of tracking are …
post GDPR. The legal requirements for personal data collection in the context of tracking are …
A US-UK usability evaluation of consent management platform cookie consent interface design on desktop and mobile
Websites implement cookie consent interfaces to obtain users' permission to use non-
essential cookies, as required by privacy regulations. We extend prior research evaluating …
essential cookies, as required by privacy regulations. We extend prior research evaluating …
Et tu, brute? Privacy analysis of government websites and mobile apps
Past privacy measurement studies on web tracking focused on high-ranked commercial
websites, as user tracking is extensively used for monetization on those sites. Conversely …
websites, as user tracking is extensively used for monetization on those sites. Conversely …
[HTML][HTML] Evolution of web tracking protection in Chrome
In our society, protecting users' privacy is of utmost importance, especially when users
access websites. Increased awareness of privacy concerns has led web browsers to …
access websites. Increased awareness of privacy concerns has led web browsers to …
Who funds misinformation? A systematic analysis of the ad-related profit routines of fake news sites
Fake news is an age-old phenomenon, widely assumed to be associated with political
propaganda published to sway public opinion. Yet, with the growth of social media, it has …
propaganda published to sway public opinion. Yet, with the growth of social media, it has …